Picture for N. Asokan

N. Asokan

Amulet: a Python Library for Assessing Interactions Among ML Defenses and Risks

Add code
Sep 15, 2025
Figure 1 for Amulet: a Python Library for Assessing Interactions Among ML Defenses and Risks
Figure 2 for Amulet: a Python Library for Assessing Interactions Among ML Defenses and Risks
Figure 3 for Amulet: a Python Library for Assessing Interactions Among ML Defenses and Risks
Figure 4 for Amulet: a Python Library for Assessing Interactions Among ML Defenses and Risks
Viaarxiv icon

Do Concept Replacement Techniques Really Erase Unacceptable Concepts?

Add code
Jun 10, 2025
Figure 1 for Do Concept Replacement Techniques Really Erase Unacceptable Concepts?
Figure 2 for Do Concept Replacement Techniques Really Erase Unacceptable Concepts?
Figure 3 for Do Concept Replacement Techniques Really Erase Unacceptable Concepts?
Figure 4 for Do Concept Replacement Techniques Really Erase Unacceptable Concepts?
Viaarxiv icon

Combining Machine Learning Defenses without Conflicts

Add code
Nov 14, 2024
Figure 1 for Combining Machine Learning Defenses without Conflicts
Figure 2 for Combining Machine Learning Defenses without Conflicts
Figure 3 for Combining Machine Learning Defenses without Conflicts
Figure 4 for Combining Machine Learning Defenses without Conflicts
Viaarxiv icon

Espresso: Robust Concept Filtering in Text-to-Image Models

Add code
May 01, 2024
Figure 1 for Espresso: Robust Concept Filtering in Text-to-Image Models
Figure 2 for Espresso: Robust Concept Filtering in Text-to-Image Models
Figure 3 for Espresso: Robust Concept Filtering in Text-to-Image Models
Figure 4 for Espresso: Robust Concept Filtering in Text-to-Image Models
Viaarxiv icon

SoK: Unintended Interactions among Machine Learning Defenses and Risks

Add code
Dec 07, 2023
Figure 1 for SoK: Unintended Interactions among Machine Learning Defenses and Risks
Figure 2 for SoK: Unintended Interactions among Machine Learning Defenses and Risks
Figure 3 for SoK: Unintended Interactions among Machine Learning Defenses and Risks
Figure 4 for SoK: Unintended Interactions among Machine Learning Defenses and Risks
Viaarxiv icon

Attesting Distributional Properties of Training Data for Machine Learning

Add code
Aug 18, 2023
Figure 1 for Attesting Distributional Properties of Training Data for Machine Learning
Figure 2 for Attesting Distributional Properties of Training Data for Machine Learning
Figure 3 for Attesting Distributional Properties of Training Data for Machine Learning
Figure 4 for Attesting Distributional Properties of Training Data for Machine Learning
Viaarxiv icon

FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks

Add code
Jul 27, 2023
Viaarxiv icon

False Claims against Model Ownership Resolution

Add code
Apr 28, 2023
Viaarxiv icon

GrOVe: Ownership Verification of Graph Neural Networks using Embeddings

Add code
Apr 17, 2023
Figure 1 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Figure 2 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Figure 3 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Figure 4 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Viaarxiv icon

On the Robustness of Dataset Inference

Add code
Oct 24, 2022
Figure 1 for On the Robustness of Dataset Inference
Figure 2 for On the Robustness of Dataset Inference
Figure 3 for On the Robustness of Dataset Inference
Figure 4 for On the Robustness of Dataset Inference
Viaarxiv icon